Far Out 312-49v9 Pdf Exam For ECCouncil Computer Hacking Forensic Investigator (V9) Certification

Exam Code: 312-49v9 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: ECCouncil Computer Hacking Forensic Investigator (V9)
Certification Provider: EC-Council
Free Today! Guaranteed Training- Pass 312-49v9 Exam.

Free demo questions for EC-Council 312-49v9 Exam Dumps Below:

Page: 1 / 17
Total 209 questions Full Exam Access
Question 1
- (Topic 2)
You are working in the Security Department of a law firm. One of the attorneys asks you about the topic of sending fake email because he has a client who has been charged with doing just that. His client alleges that he is innocent and that there is no way for a fake email to actually be sent. You inform the attorney that his client is mistaken and that fake email is a possibility and that you can prove it. You return to your desk and craft a fake email to the attorney that appears to come from his boss. What port do you send the email to on the company SMTP server?fake email to the attorney that appears to come from his boss. What port do you send the email to on the company? SMTP server?
My answer: -
Reference answer: B
Reference analysis:

None

Question 2
- (Topic 1)
Windows Security Accounts Manager (SAM) is a registry file which stores passwords in a hashed format. SAM file in Windows is located at:
My answer: -
Reference answer: A
Reference analysis:

None

Question 3
- (Topic 1)
Which of the following is not an example of a cyber-crime?
My answer: -
Reference answer: B
Reference analysis:

None

Question 4
- (Topic 1)
Mobile phone forensics is the science of recovering digital evidence from a mobile phone under forensically sound conditions.
My answer: -
Reference answer: A
Reference analysis:

None

Question 5
- (Topic 1)
Physical security recommendations: There should be only one entrance to a forensics lab
My answer: -
Reference answer: A
Reference analysis:

None

Question 6
- (Topic 3)
A(n) ____ is one that’s performed by a computer program rather than the attacker manually performing the steps in the attack sequence.
My answer: -
Reference answer: B
Reference analysis:

None

Question 7
- (Topic 1)
Data Acquisition is the process of imaging or otherwise obtaining information from a digital device and its peripheral equipment and media
My answer: -
Reference answer: A
Reference analysis:

None

Question 8
- (Topic 3)
George is a senior security analyst working for a state agency in Florida. His state's congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a "time-based induction machine" be used. What IDS feature must George implement to meet this requirement?
My answer: -
Reference answer: C
Reference analysis:

None

Question 9
- (Topic 3)
What information do you need to recover when searching a victim computer for a crime committed with specific e-mail message?What information do you need to recover when searching a victim? computer for a crime committed with specific e-mail message?
My answer: -
Reference answer: B
Reference analysis:

None

Question 10
- (Topic 1)
During the seizure of digital evidence, the suspect can be allowed touch the computer system.
My answer: -
Reference answer: B
Reference analysis:

None

Question 11
- (Topic 3)
Which of the following filesystem is used by Mac OS X?
My answer: -
Reference answer: B
Reference analysis:

EFS (Encrypting File System) is part of NTFS and used on Windows EXT2 is used on Linux NFS (Network File System) is for access to a network file system over TCP/IP

Question 12
- (Topic 1)
Syslog is a client/server protocol standard for forwarding log messages across an IP network. Syslog uses ___ to transfer log messages in a clear text format.
My answer: -
Reference answer: A
Reference analysis:

None

Question 13
- (Topic 3)
E-mail logs contain which of the following information to help you in your investigation?
(Select up to 4)
My answer: -
Reference answer: ACDE
Reference analysis:

None

Question 14
- (Topic 3)
What does the superblock in Linux define?
My answer: -
Reference answer: C
Reference analysis:

None

Question 15
- (Topic 3)
When cataloging digital evidence, the primary goal is to
My answer: -
Reference answer: B
Reference analysis:

None

Question 16
- (Topic 3)
In General, ____ Involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve the data.
My answer: -
Reference answer: D
Reference analysis:

None

Question 17
- (Topic 1)
Quality of a raster Image is determined by the ____ and the amount of information in each pixel.
My answer: -
Reference answer: A
Reference analysis:

None

Question 18
- (Topic 3)
Diskcopy is:
My answer: -
Reference answer: B
Reference analysis:

diskcopy is a STANDARD DOS utility. C:\\WINDOWS>diskcopy /? Copies the contents of one floppy disk to another.

Question 19
- (Topic 1)
Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?
My answer: -
Reference answer: C
Reference analysis:

None

Question 20
- (Topic 1)
Which wireless standard has bandwidth up to 54 Mbps and signals in a regulated frequency spectrum around 5 GHz?
My answer: -
Reference answer: A
Reference analysis:

None

Question 21
- (Topic 3)
From the following spam mail header, identify the host IP that sent this spam? From jie02@netvigator.com jie02@netvigator.com Tue Nov 27 17:27:11 2001
Received: from viruswall.ie.cuhk.edu.hk (viruswall [137.189.96.52]) by eng.ie.cuhk.edu.hk (8.11.6/8.11.6) with ESMTP id
fAR9RAP23061 for ; Tue, 27 Nov 2001 17:27:10 +0800 (HKT)
Received: from mydomain.com (pcd249020.netvigator.com [203.218.39.20]) by viruswall.ie.cuhk.edu.hk (8.12.1/8.12.1) with SMTP id fAR9QXwZ018431 for ; Tue, 27 Nov 2001 17:26:36 +0800 (HKT)
Message-Id: >200111270926.fAR9QXwZ018431@viruswall.ie.cuhk.edu.hk From: "china hotel web"
To: "Shlam"
Subject: SHANGHAI (HILTON HOTEL) PACKAGE Date: Tue, 27 Nov 2001 17:25:58 +0800 MIME-Version: 1.0
X-Priority: 3 X-MSMail- Priority: Normal
Reply-To: "china hotel web"
My answer: -
Reference answer: C
Reference analysis:

None

Question 22
- (Topic 1)
Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of the device to establish the identity of the device owner. Which of the following key combinations he can use to recover the IMEI number?
My answer: -
Reference answer: B
Reference analysis:

None

Question 23
- (Topic 2)
Where does Encase search to recover NTFS files and folders?
My answer: -
Reference answer: B
Reference analysis:

None

Question 24
- (Topic 3)
When operating systems mark a cluster as used but not allocated, the cluster is considered as ____
My answer: -
Reference answer: C
Reference analysis:

None

Question 25
- (Topic 1)
WPA2 provides enterprise and Wi-Fi users with stronger data protection and network access control which of the following encryption algorithm is used DVWPA2?
My answer: -
Reference answer: C
Reference analysis:

None

Question 26
- (Topic 3)
What type of analysis helps to identify the time and sequence of events in an investigation?
My answer: -
Reference answer: D
Reference analysis:

None

Question 27
- (Topic 2)
An investigator is searching through the firewall logs of a company and notices ICMP packets that are larger than 65,536 bytes. What type of activity is the investigator seeing?
My answer: -
Reference answer: B
Reference analysis:

None

Question 28
- (Topic 1)
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
My answer: -
Reference answer: A
Reference analysis:

None

Question 29
- (Topic 3)
How many sectors will a 125 KB file use in a FAT32 file system?
My answer: -
Reference answer: C
Reference analysis:

If you assume that we are using 512 bytes sectors, then 125x1024/512 = 250 sectors would be needed.
Actually, this is the same for a FAT16 file system as well.

Question 30
- (Topic 1)
Which of the following email headers specifies an address for mailer-generated errors, like "no such user" bounce messages, to go to (instead of the sender's address)?
My answer: -
Reference answer: A
Reference analysis:

None

Page: 1 / 17
Total 209 questions Full Exam Access